Tag: spring security
Posts of Tag: spring security
  1. Spring Security: Forgot Password Functionality

    Spring Security: Forgot Password Functionality Introduction The internet is becoming more and more service oriented with more businesses and companies coming up with offerings that can be provided or accessed o...Learn More
    JavaSpring BootSecurityspring securitySpringFunctionProgramming LanguagesBlog
  2. Monitoring with Spring Boot Actuator

    Monitoring with Spring Boot Actuator Overview In this article, we'll look into Spring Boot Actuator, which provides built-in production ready endpoints that can be used for monitoring and controlling your appli...Learn More
    JavaSpringSpring Bootspring securityProgramming Languages
  3. Spring Security: In-Memory Invalidation of JWT Tokens During User Logout

    Introduction As technology evolves and becomes more prevalent - including the evolution of large-scale service-oriented architectures, managing web security becomes more and more complex. There are many more ed...Learn More
    JavaSpring BootSpringspring securityjwtSecurityProgramming LanguagesBlog
  4. Spring Boot: Guide to RestTemplate

    Introduction In this guide, we'll be taking a look at one of the most frequently used and well-known template in the Spring Ecosystem - known as RestTemplate, and how to use RestTemplate to send HTTP requests, ...Learn More
    JavaSpring BootSpringspring securityProgramming Languages
  5. Prevent Cross-Site Scripting (XSS) in Spring Boot with Content-Security Policies (CSPs)

    .lazyload-placeholder { display: none; } Introduction The security of users and their personal data while using a web application is paramount. While this guiding principle has been acknowledged even from the e...Learn More
    JavaSpring BootSpringspring securityProgramming Languages
  6. [Spring Boot] How to stub @AuthenticationPrincipal argument with Spring-Security in Unit Tests

    There may be some situations where user information is required as part of business logic. Quite often, this process takes place after authentication. In this article, let us find out how user information can b...Learn More
    NewsjunitSpring BootUnit Testingtddspring securityBlog